ssh -p 232 -T -y -i /etc/cmh-ra/keys/cmh-ra-key.priv -R 99999:127.0.0.1:80 cmh-ra@fwd1.mios.comOr else just reboot Vera.5. Verify that the remote access tunnel is turned off by running ps and noting the absence of ssh processes, or by seeing this message in the output of logread:

MiOS Remote Control Service is disabled. We won't start RC tunnels.I'd recommend doing this only if you suffer from severe paranoia about secure tunnels to remote servers that you didn't create, or if you already have a way to securely access your LAN from the Internet. I have a proper VPN, so I'm happy to connect to my VPN before connecting to Vera.

Needless to say, put this back the way you found it if you expect to get tech support from MCV.

Did anyone get an answer to this? I suffer from severe paranoia since everyday companies get hacked and thousands of credit cards get stolen. Makes me thing a MiCasaVerde server may get hacked also. I would like to disable remote access since I have a VPN to my home, but also make iVera work without having to connect to a MiCasaVerde server first when using this over VPN. Has anyone noticed that a Vera2 box connects to the following servers (this is not a complete list), what are all these connections for?

Very affraied by all of that... Once again when will we have a HTTPS portal on VERA in order to have full control of our security !!! Easy to say and easy to do !!! why is it not obvious for a VERA !!!

I did this, but then it seemed that my iVera app wasn't able to connect to my Vera 2 after I connected my iPhone to the VPN. I read somewhere about iPhone's not being able to map names to addresses when you're connecting to vpn. Not sure how this'll work yet. Probably need to ask iVera author some questions.

after I connected my iPhone to the VPN. I read somewhere about iPhone's not being able to map names to addresses when you're connecting to vpn.

It depends on your VPN technology. If it's an iPhone then you are probably using IPsec/L2TP. It's common that server implementations of IPsec/L2TP don't route multicast packets from the LAN to the VPN, so your iPhone can't auto-detect the Vera over Zeroconf/Bonjour. I've got a similar issue with VPNing home and not being able to see my EyeTV instance automatically.

If your Vera is at a fixed IP address on your home network then you might be able to convince iVera to talk straight to the IP address. (I don't use iVera, but I know SQ Remote has this option.)

I'm guessing that disabling the Vera HTTP tunnel makes findvera or whatever it's called now not able to determine the LAN address of Vera, so iVera can't learn the address that it starts sending UPnP requests to in order to speak to Vera. Or something like that.

I'm using DD-WRT w/ PPTP for VPN. The iVera author said that it goes direct to the Vera's IP if it's known... but it seems that he may also be making a call out to a website which is not resolving and hanging up the connection to the Vera. I owe him some testing when I get the time. He gave me a url to test on my iPhone while my VPN is connected and then while it's not.

ssh -p 232 -T -y -i /etc/cmh-ra/keys/cmh-ra-key.priv -R 99999:127.0.0.1:80 cmh-ra@fwd1.mios.comOr else just reboot Vera.5. Verify that the remote access tunnel is turned off by running ps and noting the absence of ssh processes, or by seeing this message in the output of logread:

MiOS Remote Control Service is disabled. We won't start RC tunnels.I'd recommend doing this only if you suffer from severe paranoia about secure tunnels to remote servers that you didn't create, or if you already have a way to securely access your LAN from the Internet. I have a proper VPN, so I'm happy to connect to my VPN before connecting to Vera.

Needless to say, put this back the way you found it if you expect to get tech support from MCV.

This will go on my to do list for How To'sMaybe i can elaborate on it using the standard cp.mios.com functions a little bit.

A warning... my disabled tunnel spontaneously decided to re-enable itself some time in the last few months. I am going to have to put in a periodic check to prevent remote access re-enabling itself. Nice.